ESET-Branded Wiper Attack Targets Israel; Firm Denies Compromise

Share This Post

Security firm ESET is refuting reports that cyberattackers compromised its platforms and used them to target customers in Israel with dangerous wiper malware.

“We are aware of a security incident which affected our partner company in Israel last week,” it acknowledged on X, formerly known as Twitter. “Based on our initial investigation, a limited malicious email campaign was blocked within ten minutes. ESET technology is blocking the threat and our customers are secure. ESET was not compromised and is working closely with its partner to further investigate and we continue to monitor the situation.”

Security researcher Kevin Beaumont (aka Gossi the Dog) prompted the response after blogging about a malicious email that an ESET user posted on the ESET user forum. The email was flagged as malicious, with the subject line, “Government-Backed Attackers May Be Trying to Compromise Your Device!” It purported to be from the ESET team, offering extra security defense in the face of an ongoing attack:

Source: ESET user forum.

The email had a .ZIP attachment that, if opened, unpacked a destructive wiper malware that bears resemblance to that used by the Handala threat group, according to the person who flagged the email for Beaumont. Handala, so named for the political cartoon character that has come to personify the Palestinian people’s national identity, has become known for targeting Israeli organizations  with file-destroying wipers in the wake of the Oct. 7 Hamas attacks and resulting war.

Related:Dark Reading Confidential: Meet the Ransomware Negotiators

Beaumont noted, “I managed to obtain the email, which passes both DKIM and SPF checks for coming from ESET’s store,” he said in the blog. “Additionally, the link is indeed to backend.store.eset.co.il — owned by ESET Israel.”

This led him to conclude via Mastodon, “ESET Israel definitely got compromised, this thing is fake ransomware that talks to an Israeli news org server for whatever reason.”

ESET has now categorically refuted that takeaway, so the assumption is that the cyberattackers were using some sort of MO to get around anti-spoofing measures for the email and the .ZIP link. ESET did not immediately return a request for comment from Dark Reading.

The campaign is now blocked for ESET customers.

https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltf5a94a4994591ba6/6712940a0afe0a93ff319614/ESET_Email.png?width=484&auto=webp&quality=80&disable=upscale

This post was originally published on this site

More Articles

Article

Navigating SEC Regulations In Cybersecurity And Incident Response

Free video resource for cybersecurity professionals. As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an investigation, handling, and responding to incidents.